1985
DOI: 10.1109/mcom.1985.1092643
|View full text |Cite
|
Sign up to set email alerts
|

Message authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

1992
1992
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(13 citation statements)
references
References 2 publications
0
13
0
Order By: Relevance
“…Definition 4 We say that an authentication (signature) scheme is a t out of 1 multi-sender authentication (signature) scheme, when any t out of l senders cannot commit a substitution or impersonation attack, but t + 1 shareholders can create an authenticator (signature) for the message.…”
Section: A the Multi-sender Scenariomentioning
confidence: 99%
“…Definition 4 We say that an authentication (signature) scheme is a t out of 1 multi-sender authentication (signature) scheme, when any t out of l senders cannot commit a substitution or impersonation attack, but t + 1 shareholders can create an authenticator (signature) for the message.…”
Section: A the Multi-sender Scenariomentioning
confidence: 99%
“…Because of a variety of birthday-type attacks discovered in conjunction with Don Coppersmith, Jueneman suggested computing the QCMDC four times, using the result of one iteration as the IV for the next iteration, and then concatenating the results to obtain a 128-bit hash value [793]. This was further strengthened by doing the four iterations in parallel and cross-linking them [790,791].…”
Section: Jueneman's Methodsmentioning
confidence: 99%
“…For more mathematical information, consult [1028,793,791,1138,1069,414,91,858,1264]. Bart Preneel's thesis [1262] is probably the most comprehensive treatment of one-way hash functions.…”
Section: Overview Of One-way Hash Functionsmentioning
confidence: 99%
“…A Message Authentication Code (MAC) applied to a record would provide us with a way of checking for any changes made [8].We could do this on an individual record basis, creating a MAC of the entire record, storing the MAC value elsewhere on the system, and comparing the stored MAC with a freshlycomputed MAC for every record read event.…”
Section: Integrity Mechanismsmentioning
confidence: 99%